There are two more chapters for me to read.
I have a sneaking suspicion that I'm going to want more than that.Very well done!

I kept seeing parallels between the supporting cast and iconic skips, particularly Creepy Bastard and a certain elderly man with a striking smile. I can't wait to finish reading and/or check the hub spoilers to see if I was on to anything.

I don't know networking very well, but wouldn't the SSL encryption on most banking websites conceal the contents of any traffic made on the phone? If my understanding is correct they could monitor that someone was visiting a bank's website, but little else.

The characterization of the Foundation seems a little over the top evil-wise, especially given the cold-not-cruel dogma that is popular among some members.

All that being said, this very much has my attention. It's long, but it's well wortwhile. Shame about the spoiler in the tags…

Cheers - the individual transactions probably aren't visible, though if you're trying to track down who might be moving money inside a prison, you probably start from there, figure out who was using the phone (e.g. by leaning on Travis or his cellmate) and then approach the bank to work out the details.

Re the Foundation's characterisation, I've taken a more sympathetic line than, say, the security clearance levels page, where D-Class are subject to mass execution if any one of them fails a polygraph, and hopefully tried to convey that relations between researchers and D-Class are going to be strained where the former is aware what eventually happens to them.

I suppose I just have a hard time with the idea that the Foundation would be so cavalier about telling the D's exactly where they stand. Telling someone to their face, "you're disposable" while trying to incentivize them with a reward in a month seems like really iffy psychology to me.

Regardless, it's mostly moot, as I'm very much enjoying the story and didn't dwell on this as much in part 2. On to part 3!